This blog is sponsored by Nexor and focuses on Cyber Security issues and market observations, but you will also find the occasional article about small businesses (SMEs) and the IT industry in general.
- Design for the Novice… - In the article How to Avoid a Common Product Mistake Many Teams Make, Mark Suster (@msuster) observes The single biggest mistake most product teams make is building technology for what they believe the user would want rather than what the actual end-user needs At NEXOR, a large part of our business is providing security enforcing […]
- A Brief Introduction into Threat Analysis - The purpose of this blog piece is to introduce the concept of threat analysis, what it is and why it’s a good idea, while at the same time present a simple and effective way to try it yourself. It is part of a blog series on the development approach at Nexor. It is now an […]
- Reaction to BIS Cyber Security Standard - Making an organisation cyber-secure is difficult. As a supplier, demonstrating to an external customer that you are cyber-secure is even more difficult. Conversely, as a customer how can you tell which organisations take it seriously? One approach is to look at adherence or compliance to a security standard. But which one should you look for? […]
- Continuous Improvement - At NEXOR, one of our company values is continuous improvement. When I say it’s a company value, I’m not talking about a checkbox on a form. This is something that is truly ingrained into everything we do, and it’s why we’re the best. I’m a Software Engineer at NEXOR, and for some time now we […]
- Diode Applications: Secure Printing - In this blog series, I have been exploring applications for Data Diodes. This week, I look at the issue of printing between different networks. Printing is an everyday necessity for businesses. In order for employees to function efficiently it is essential that they have access to printing resources. Getting the printing capacity right is an […]
The issues that are blogged about most are:
- Security awareness for non-technical home users
- Trust and assurance of software and solutions
- People, process and technology triangle
- Secure Information Exchange
The blog is also open to guest contributions, contact Colin Robbins with your suggested topics.